NSIGHT SERIES May 2020 — Issue 5

Total Page:16

File Type:pdf, Size:1020Kb

NSIGHT SERIES May 2020 — Issue 5 NSIGHT SERIES May 2020 — Issue 5 The Decline of the Dark Web How Mobile Solutions have Disrupted the Dark Web The dark web is in decline. Once the preferred means for anonymizing users’ online activity, the dark web has now been supplanted by encrypted mobile applications and alternate solutions. Similarly, aggressive law enforcement actions have shuttered many of the dark web’s largest forums, making it a much more fleeting and much less secure destination for criminal activity. As a result, the number of users accessing dark web sites has dropped. Instead, many users are connecting through the dark web via mobile applications on Android and iOS, rather than to the dark web via standard browsers, to obfuscate their internet traffic. Indeed, the number of users accessing the Tor network has increased, even as the number of users accessing hidden Dark web platforms such as The Onion Router (Tor), I2P, service sites—the “dark” part of the dark web—has dropped. Freenet, and Zeronet, attempt to anonymize users’ digital Moreover, encrypted applications like Telegram, Signal, fingerprint so that technical attributes like IP addresses are and Wickr.me have lowered the barrier to entry for secure not easily available to entities with intent to track users’ communication and illicit transactions. As a result, just like online activity. This emphasis on anonymity was designed to many other industries, the dark web has been disrupted keep the dark web free from oversight, free from censorship, by technological innovation and aggressive competition, and open to anyone in any location. The developers of Tor, triggering a gradual decline and turning the so-called the most popular dark web platform, promote it as a tool invisible internet even more opaque. to combat oppression and connect people who might not otherwise have open access to the internet. A substantial What is The Dark Web? percentage of Tor users come from countries like Iran, China, and Russia, where governments have restricted the The “dark web” refers to parts of the internet that require content its citizens can access. Major news outlets, sites like the use of special tools or routing protocols to access. Facebook, and even U.S. federal agencies maintain websites By comparison, the clear or surface web does not require on the dark web so its users can securely communicate from any special tools to access (think, espn.com or cnn.com). A countries where free speech is controlled. traditional web browser, unless specially configured, cannot connect users to a dark web “hidden service” site. These sites However, the lack of oversight has earned the dark web a rely on specific encryption and routing protocols to protect reputation as a haven for criminals looking to sell drugs, users’ identities. stolen identities, and other illicit services. Illegal transactions largely occur on dark web markets, which make up some of fixes for issues difficult. For example, The Tor Project recently Tor’s most popular hidden service sites. These markets are released an update that patched a major vulnerability that populated by hundreds of vendors and buyers, all of whom had been taking hidden service sites offline for years. The bug have learned how to operate specialized programs that keep was so well-known by the time it was addressed that a free- their identities hidden. To operate on a dark web market, to-use dark web denial-of-service (DOS) tool meant to exploit a user must create an account which is usually linked to a the bug had been available on Github for four years. secure dark web email address. They can then buy and sell content using cryptocurrency, provided they’ve established a Feeling Around in The Dark Web crypto wallet and obtained digital funds without linking them to their personal information. If a user attempts to acquire The lack of centralized information, coupled with a lack illegal goods from these markets without practicing proper of trust in fellow dark web users, has made it difficult for operational security, they risk compromising not only their the dark web community to collectively evolve, or create funds, but also their identity. a set of tools equivalent to those on the clear web. While the dark web has a few options for search engines, none A lack of oversight has also made it difficult for developers to are particularly effective. There are dozens of social media create and promote dark web resources. Due to its criminal sites that prioritize privacy being offered, but none has connotation, clear web sites are reluctant to post content gained enough notoriety to attract a wide user base. This, that links its viewers to potentially illicit hidden service sites in turn, means they aren’t advertised in community forums, on the dark web. Resources dedicated to the dark web are and ultimately have little chance of attracting a wider user routinely targeted by law enforcement entities and shut base in the future. Marketplaces and community forums down, so anyone interested in learning about how to operate have maintained their popularity on the dark web primarily on the dark web will need to look through community forums, because they offer the illicit goods and services without archived pages, and posts on social media. content censorship that could not easily be found elsewhere. Unlike many popular clear web services, security patches, Even the dark web’s most visited markets are having updates, and improvements to Tor are released slowly and trouble staying active as law enforcement entities around sporadically, as the organization responsible for the browser, the world begin to dedicate substantial resources towards the Tor Project, has a limited number of resources. The conducting effective cyber investigations. From original anonymous nature of Tor makes identifying and implementing marketplaces like Silk Road, to recent marketplaces like ©2020 Ntrepid LLC. All rights reserved. Ntrepid LLC Proprietary Information. 5-20-001 In an environment where Tor and the dark web once offered some control over the information users shared over the internet, secure messaging apps have begun to gain traction. Platforms like Signal, Telegram, and Whatsapp all offer options to encrypt communications between users and prevent unintended parties from intercepting content. While the user has less control over configurations on mobile devices than they would through Tor on a standard computer, these apps allow anyone with a smartphone to create secure accounts quickly and with little effort. Just as with Tor on the dark web, mobile platforms that were developed to facilitate free speech are gradually being co-opted by groups with criminal intent. Apps like Telegram have been targeted by extremist groups who have graduated Alphabay and Dream Market, hidden service sites offering from the dark web to mobile services in order to expand their illegal content are routinely targeted and taken down as reach to a larger audience. Telegram, intentionally or not, soon as they gain prominence. Many markets that attempt to has become a platform where radical users can connect and fill the vacuum have “exit scammed”—a fraudulent practice spread extremist ideology. Thanks to its privacy-focused wherein market admins or other actors appear to be running infrastructure, these users are able to create closed groups a market or providing a service but are in fact stealing users’ and channels full of encrypted content that can only be cryptocurrency before shutting down their site—before they accessed by invitation. They can also create public channels are caught by law enforcement. The constant uncertainty, to broadcast read-only messages as a supplement to high level of risk, and lack of continuity make dark web recruitment and indoctrination campaigns. markets less attractive each year. Secure communication platforms on mobile devices, however, present an interesting Groups ranging from Islamic extremists like IS and Al alternative. Qaeda to white supremacists and neo-nazis have migrated from hidden service sites on Tor to groups and channels The Rise in Alternate Solutions on Telegram. Instead of targeting only users technically proficient enough to avoid compromising themselves on Mobile devices are simplifying how users access web- the dark web, these extremists now have access to 200 based services. Smartphone owners have a connection to million active monthly users through an easily downloadable the internet in their pockets at all times, and this connection smartphone app. Users looking for stronger privacy is available to millions of people that don’t have access to features can try apps like Signal and Wickr, which offer a standard computer or home internet service. There are end-to-end encryption and require little to no verifiable approximately 3.5 billion smartphone users worldwide as of personal information. These also offer users the ability to 2020, and it’s estimated that around sixty percent of annual create self-destructing messages so that any incriminating web traffic now comes from mobile devices. People are able conversations are inaccessible to law enforcement. These to share more of their lives from more places than ever, and messaging apps are a popular supplement for vendors of that’s put a renewed emphasis on securing users’ privacy. illicit goods who want to talk directly to customers or conduct business outside of Tor’s dark web markets. ©2020 Ntrepid LLC. All rights reserved. Ntrepid LLC Proprietary Information. 5-20-001 The Tor Project is working to adapt to this new mobile- enforcement. Law enforcement take downs of popular dark focused environment. The organization recently released web markets and resources will prevent an increase in hidden an app for the Android mobile operating system and service site usage. Users looking for platforms that advocate recommends the Orbot app for users on an iOS device.
Recommended publications
  • PDF FACULTAD DE BELLAS ARTES Archivo Digital: Descarga Y Online ISBN 978-950-34-1541-2 Decana Secretaria De 1
    1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX 1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX 1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX Diciembre de 2016 Visualidades contemporáneas: patrimonio, exposiciones y dispositivos / Mariel Ciafardo... [et al.]. - 1a ed. - La Plata : Universidad Nacional de La Plata. Facultad de Bellas Artes, 2017. Libro digital, PDF FACULTAD DE BELLAS ARTES Archivo Digital: descarga y online ISBN 978-950-34-1541-2 Decana Secretaria de 1. Patrimonio. 2. Historia del Arte. I. Ciafardo, Mariel Prof. Mariel Ciafardo Publicaciones y Posgrado CDD 709 Prof. María Elena Larrègle Vicedecana Prof. Cristina Terzaghi Secretaria de Extensión Prof. María Victoria Mc Coubrey Secretaria de Decanato Prof. Paula Sigismondo Secretario de Relaciones Institucionales Secretaria de Asuntos Académicos DI Eduardo Pascal Prof. Santiago Romé Secretario de Cultura Jefa del Departamento Lic. Carlos Coppa de Estudios Históricos y Sociales Lic. Paola Sabrina Belén Secretario de Producción y Comunicación Secretario de Planificación, Prof. Martín Barrios Infraestructura y Finanzas DCV Juan Pablo Fernández Secretario de Asuntos Estudiantiles Prof. Esteban Conde Ferreira Secretaria de Ciencia y Técnica Lic. Silvia García Secretario de Programas Externos DCV Fermín González Laría COMITÉ ORGANIZADOR Lic. Liliana Conles Prof. Sergio Moyinedo Prof. Mariel Ciafardo Lic. Paola Sabrina Belén Lic. Natalia Giglietti Mg. Francisco Lemus Diseño Prof. Marina Panfili DCV Diego R. Ibañez Roka Edición de contenido Lic. Natalia Giglietti Mg. Francisco Lemus Obra de tapa Cristina Schiavi, Nocturno, 2013, acrílico sobre mdf, 135 x 135 cm, Colección Malba-Fundación Costantini.
    [Show full text]
  • IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
    1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks.
    [Show full text]
  • Privacy Enhancing Technologies 2003 an Analysis of Gnunet And
    Privacy Enhancing Technologies 2003 An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks Dennis Kügler Federal Office for Information Security, Germany [email protected] 1 Anonymous, Censorship-Resistant Networks • Anonymous Peer-to-Peer Networks – Gnutella • Searching is relatively anonymous • Downloading is not anonymous • Censorship-Resistant Networks – Eternity Service • Distributed storage medium • Attack resistant • Anonymous, Censorship-Resistant Networks – Freenet – GNUnet 2 GNUnet: Obfuscated, Distributed Filesystem Content Hash Key: [H(B),H(E (B))] • H(B) – Content encryption: H(B) – Unambiguous filename: H(E (B)) H(B) • Content replication – Caching while delivering – Based on unambiguous filename • Searchability – Keywords 3 GNUnet: Peer-to-Peer MIX Network • Initiating node – Downloads content • Supplying nodes – Store content unencrypted • Intermediary nodes – Forward and cache encrypted content – Plausible deniability due to encryption • Economic model – Based on credit Query A Priority=20 B – Charge for queries c =c -20 B B - – Pay for responses 4 GNUnet Encoding • DBlocks DBlock DBlock ... DBlock – 1KB of the content – Content hash encrypted • IBlocks IBlock ... IBlock – CHKs of 25 DBlocks – Organized as tree – Content hash encrypted IBlock • RBlock – Description of the content – CHK of the root IBlock RBlock – Keyword encrypted 5 The Attacker Model • Attacker – Controls malicious nodes that behave correctly – Prepares dictionary of interesting keywords – Observes queries and
    [Show full text]
  • An Evolving Threat the Deep Web
    8 An Evolving Threat The Deep Web Learning Objectives distribute 1. Explain the differences between the deep web and darknets.or 2. Understand how the darknets are accessed. 3. Discuss the hidden wiki and how it is useful to criminals. 4. Understand the anonymity offered by the deep web. 5. Discuss the legal issues associated withpost, use of the deep web and the darknets. The action aimed to stop the sale, distribution and promotion of illegal and harmful items, including weapons and drugs, which were being sold on online ‘dark’ marketplaces. Operation Onymous, coordinated by Europol’s Europeancopy, Cybercrime Centre (EC3), the FBI, the U.S. Immigration and Customs Enforcement (ICE), Homeland Security Investigations (HSI) and Eurojust, resulted in 17 arrests of vendors andnot administrators running these online marketplaces and more than 410 hidden services being taken down. In addition, bitcoins worth approximately USD 1 million, EUR 180,000 Do in cash, drugs, gold and silver were seized. —Europol, 20141 143 Copyright ©2018 by SAGE Publications, Inc. This work may not be reproduced or distributed in any form or by any means without express written permission of the publisher. 144 Cyberspace, Cybersecurity, and Cybercrime THINK ABOUT IT 8.1 Surface Web and Deep Web Google, Facebook, and any website you can What Would You Do? find via traditional search engines (Internet Explorer, Chrome, Firefox, etc.) are all located 1. The deep web offers users an anonym- on the surface web. It is likely that when you ity that the surface web cannot provide. use the Internet for research and/or social What would you do if you knew that purposes you are using the surface web.
    [Show full text]
  • Into the Reverie: Exploration of the Dream Market
    Into the Reverie: Exploration of the Dream Market Theo Carr1, Jun Zhuang2, Dwight Sablan3, Emma LaRue4, Yubao Wu5, Mohammad Al Hasan2, and George Mohler2 1Department of Mathematics, Northeastern University, Boston, MA 2Department of Computer & Information Science, Indiana University - Purdue University, Indianapolis, IN 3Department of Mathematics and Computer Science, University of Guam, Guam 4Department of Mathematics and Statistics, University of Arkansas at Little Rock, AK 5Department of Computer Science, Georgia State University, Atlanta, GA [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] Abstract—Since the emergence of the Silk Road market in Onymous" in 2014, a worldwide action taken by law enforce- the early 2010s, dark web ‘cryptomarkets’ have proliferated and ment and judicial agencies aimed to put a kibosh on these offered people an online platform to buy and sell illicit drugs, illicit behaviors [5]. Law enforcement interventions such as relying on cryptocurrencies such as Bitcoin for anonymous trans- actions. However, recent studies have highlighted the potential for Onymous, along with exit scams and hacks, have successfully de-anonymization of bitcoin transactions, bringing into question shut down numerous cryptomarkets, including AlphaBay, Silk the level of anonymity afforded by cryptomarkets. We examine a Road, Dream, and more recently, Wall Street [6]. Despite these set of over 100,000 product reviews from several cryptomarkets interruptions, new markets have continued to proliferate. The collected in 2018 and 2019 and conduct a comprehensive analysis authors of [7] note that there appears to be a consistent daily of the markets, including an examination of the distribution of drug sales and revenue among vendors, and a comparison demand of about $500,000 for illicit products on the dark web, of incidences of opioid sales to overdose deaths in a US city.
    [Show full text]
  • Improving Signal's Sealed Sender
    Improving Signal’s Sealed Sender Ian Martiny∗, Gabriel Kaptchuky, Adam Avivz, Dan Rochex, Eric Wustrow∗ ∗University of Colorado Boulder, fian.martiny, [email protected] yBoston University, [email protected] zGeorge Washington University, [email protected] xU.S. Naval Avademy, [email protected] Abstract—The Signal messaging service recently deployed a confidential support [25]. In these cases, merely knowing to sealed sender feature that provides sender anonymity by crypto- whom Alice is communicating combined with other contextual graphically hiding a message’s sender from the service provider. information is often enough to infer conversation content with- We demonstrate, both theoretically and empirically, that this out reading the messages themselves. Former NSA and CIA one-sided anonymity is broken when two parties send multiple director Michael Hayden succinctly illustrated this importance messages back and forth; that is, the promise of sealed sender of metadata when he said the US government “kill[s] people does not compose over a conversation of messages. Our attack is in the family of Statistical Disclosure Attacks (SDAs), and is made based on metadata” [29]. particularly effective by delivery receipts that inform the sender Signal’s recent sealed sender feature aims to conceal this that a message has been successfully delivered, which are enabled metadata by hiding the message sender’s identity. Instead of by default on Signal. We show using theoretical and simulation- based models that Signal could link sealed sender users in as seeing a message from Alice to Bob, Signal instead observes few as 5 messages. Our attack goes beyond tracking users via a message to Bob from an anonymous sender.
    [Show full text]
  • How to Use Encryption and Privacy Tools to Evade Corporate Espionage
    How to use Encryption and Privacy Tools to Evade Corporate Espionage An ICIT White Paper Institute for Critical Infrastructure Technology August 2015 NOTICE: The recommendations contained in this white paper are not intended as standards for federal agencies or the legislative community, nor as replacements for enterprise-wide security strategies, frameworks and technologies. This white paper is written primarily for individuals (i.e. lawyers, CEOs, investment bankers, etc.) who are high risk targets of corporate espionage attacks. The information contained within this briefing is to be used for legal purposes only. ICIT does not condone the application of these strategies for illegal activity. Before using any of these strategies the reader is advised to consult an encryption professional. ICIT shall not be liable for the outcomes of any of the applications used by the reader that are mentioned in this brief. This document is for information purposes only. It is imperative that the reader hires skilled professionals for their cybersecurity needs. The Institute is available to provide encryption and privacy training to protect your organization’s sensitive data. To learn more about this offering, contact information can be found on page 41 of this brief. Not long ago it was speculated that the leading world economic and political powers were engaged in a cyber arms race; that the world is witnessing a cyber resource buildup of Cold War proportions. The implied threat in that assessment is close, but it misses the mark by at least half. The threat is much greater than you can imagine. We have passed the escalation phase and have engaged directly into full confrontation in the cyberwar.
    [Show full text]
  • Improving Signal's Sealed Sender
    Improving Signal’s Sealed Sender Ian Martiny∗, Gabriel Kaptchuky, Adam Avivz, Dan Rochex, Eric Wustrow∗ ∗University of Colorado Boulder, fian.martiny, [email protected] yBoston University, [email protected] zGeorge Washington University, [email protected] xU.S. Naval Avademy, [email protected] Abstract—The Signal messaging service recently deployed a confidential support [25]. In these cases, merely knowing to sealed sender feature that provides sender anonymity by crypto- whom Alice is communicating combined with other contextual graphically hiding a message’s sender from the service provider. information is often enough to infer conversation content with- We demonstrate, both theoretically and empirically, that this out reading the messages themselves. Former NSA and CIA one-sided anonymity is broken when two parties send multiple director Michael Hayden succinctly illustrated this importance messages back and forth; that is, the promise of sealed sender of metadata when he said the US government “kill[s] people does not compose over a conversation of messages. Our attack is in the family of Statistical Disclosure Attacks (SDAs), and is made based on metadata” [29]. particularly effective by delivery receipts that inform the sender Signal’s recent sealed sender feature aims to conceal this that a message has been successfully delivered, which are enabled metadata by hiding the message sender’s identity. Instead of by default on Signal. We show using theoretical and simulation- based models that Signal could link sealed sender users in as seeing a message from Alice to Bob, Signal instead observes few as 5 messages. Our attack goes beyond tracking users via a message to Bob from an anonymous sender.
    [Show full text]
  • Subtitling in the Iranian Mediascape: Towards a Culture-Specific Typology
    Subtitling in the Iranian Mediascape: Towards a Culture-Specific Typology Masood Khoshsaligheh1a, Saeed Ameri2a, Farzaneh Shokoohmand3a, Milad Mehdizadkhani4b Abstract Given the increasing pace of dissemination of cultural ARTICLE HISTORY: content across global borders, subtitling as a cost-effective Received May 2020 solution for rendering audiovisual programs is gaining more Received in revised form July 2020 popularity, even in societies, which have been traditionally Accepted July 2020 using dubbing as the dominant modality for foreign films and Available online August 2020 television series. Likewise, various types of subtitling practices have developed and are used in Iran both at official and non-official outlets. While official dubbing has failed in some aspect in addressing the growing interest of Iranian viewers of foreign content, a variety of non-professional subtitling has been filling the gap, and subtitling appears to be dominating the audiovisual media market. Despite such KEYWORDS: developments, the necessities of professional practice of Non-professional subtitling subtitling, including standardized guidelines, codes of ethics Amateur subtitling and practice, and training, have never been realized in Iran. Quasi-professional subtitling In the absence of a professional subtitling tradition, this Professional subtitling article presents the status quo of non-professional subtitling Subtitling for the d/Deaf and hard of into Persian and introduces the specific typology of this hearing practice in the Iranian mediascape. © 2020 IJSCL. All rights reserved. 1 Associate Professor, Email: [email protected] (Corresponding Author) Tel: +98-915-5012669 2 PhD, Email: [email protected] 3 Assistant Professor, Email: [email protected] 4 PhD Candidate, Email: [email protected] a Ferdowsi University of Mashhad, Iran b University of Szeged, Hungary 56 Subtitling in the Iranian Mediascape: Towards a Culture-Specific Typology 1.
    [Show full text]
  • CS505: Distributed Systems
    Cristina Nita-Rotaru CS505: Distributed Systems Lookup services. Chord. CAN. Pastry. Kademlia. Required Reading } I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, H. Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, SIGCOMM 2001. } A Scalable Content-Addressable Network S.a Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, SIGCOMM 2001 } A. Rowstron and P. Druschel. "Pastry: Scalable, decentralized object location and routing for large-scale peer-to-peer systems". IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), 2001 } Kademlia: A Peer-to-peer Information System Based on the XOR Metric. P. Maymounkov and D. Mazieres, IPTPS '02 2 DHTs 1: Lookup services Peer-to-Peer (P2P) Systems } Applications that take advantage of resources (storage, cycles, content, human presence) available at the edges of the Internet. } Characteristics: } System consists of clients connected through Internet and acting as peers } System is designed to work in the presence of variable connectivity } Nodes at the edges of the network have significant autonomy; no centralized control } Nodes are symmetric in function 4 DHTs Benefits of P2P and Applications } High capacity: all clients provide resources (bandwidth, storage space, and computing power). The capacity of the system increases as more nodes become part of the system. } Increased reliability: achieved by replicating data over multiple peers, and by enabling peers to find the data without relying on a centralized index server. } Applications:
    [Show full text]
  • Closed Groups, Messaging Apps & Online
    FIRST DRAFT'S ESSENTIAL GUIDE TO Closed Groups, Messaging Apps & Online Ads November 2019 TABLE OF CONTENTS Introduction 5 CHAPTER 1 Understanding ad libraries 13 CHAPTER 2 Facebook groups 21 CHAPTER 3 Closed messaging apps 27 CHAPTER 4 Ethical considerations 37 Conclusion 43 3 ABOUT THE AUTHORS Carlotta Dotto is a research reporter at First Draft, specialising in data-led investigations into global information disorder and coordinated networks of amplification. She previously worked with The Times’ data team and La Repubblica’s Visual Lab, and written for a number of publications including The Guardian, the BBC and the New Internationalist. Rory Smith is a senior investigator at First Draft where he researches and writes about information disorder. Before joining First Draft, Rory worked for CNN, Vox, Vice and Introduction Truthout, covering various topics from immigration and food policy to politics and organized crime. Claire Wardle currently leads the strategic direction and research for First Draft. In 2017 she co-authored the seminal report, Information Disorder: An interdisciplinary Framework for Research and Policy, for the Council of Europe. Previous to that she was a Fellow at the Shorenstein Center for Media, Politics and Public Policy at Harvard's Kennedy School, the Research Director at the Tow Center for Digital Journalism at Columbia University Graduate School of Journalism and head of social media for the United Nations Refugee Agency. She was also the project lead for the BBC Academy in 2009, where she designed a comprehensive training program for social media verification for BBC News, that was rolled out across the organization.
    [Show full text]
  • A Framework for Identifying Host-Based Artifacts in Dark Web Investigations
    Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Fall 11-2020 A Framework for Identifying Host-based Artifacts in Dark Web Investigations Arica Kulm Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Databases and Information Systems Commons, Information Security Commons, and the Systems Architecture Commons Recommended Citation Kulm, Arica, "A Framework for Identifying Host-based Artifacts in Dark Web Investigations" (2020). Masters Theses & Doctoral Dissertations. 357. https://scholar.dsu.edu/theses/357 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. A FRAMEWORK FOR IDENTIFYING HOST-BASED ARTIFACTS IN DARK WEB INVESTIGATIONS A dissertation submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cyber Defense November 2020 By Arica Kulm Dissertation Committee: Dr. Ashley Podhradsky Dr. Kevin Streff Dr. Omar El-Gayar Cynthia Hetherington Trevor Jones ii DISSERTATION APPROVAL FORM This dissertation is approved as a credible and independent investigation by a candidate for the Doctor of Philosophy in Cyber Defense degree and is acceptable for meeting the dissertation requirements for this degree. Acceptance of this dissertation does not imply that the conclusions reached by the candidate are necessarily the conclusions of the major department or university. Student Name: Arica Kulm Dissertation Title: A Framework for Identifying Host-based Artifacts in Dark Web Investigations Dissertation Chair: Date: 11/12/20 Committee member: Date: 11/12/2020 Committee member: Date: Committee member: Date: Committee member: Date: iii ACKNOWLEDGMENT First, I would like to thank Dr.
    [Show full text]